Research paper

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 5-8 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Air force missile

For this assignment, you will also need to read the 2 papers that are saved as:

15 sept-lights-out.pdf and 15 sept-HPEM.pdf, which can be found on Canvasor at the links:

https://breakingdefense.com/2012/10/new-air-force-missile-turns-out-lights-with-raytheon-microwave-t/

https://defensesystems.com/articles/2017/10/18/air-force-hpem.aspx

2.Read the 2 articles about Raytheon’s new missile.  What does this missile do?  Explain very clearly.[4 pts]

3.From an Information Systems standpoint, explain the impact of what this means, i.e. if this missile was actually used, what is the impact to any and all information systems –impact to anything else??  Give this deep thought and be VERY complete! [8 pts]

4.Does this concern you? (Think hard about this before you answer!)   How?  STRONGLY Support your answer with specific examples of your concerns or likewise be very supportive of why this does NOT concern you.[8 pts]

5.Next, research SDI (Strategic Defense Initiative) or “Star Wars”, which was a President Reagan term and initiative.  What is this(be very clear)?  Could this help the current (potential use of EMPs) situation?  Explain thoroughly.[8 pts]

6.Lastly, imagine that you have been hired to protect your company against these Raytheon missiles.  What options do you have?  Be very clear and thorough.Think through ALLpossibilities. (feel free to be creative!))[8 pts]

Not to exceed two pages.

short answer

 

As Hite and Seitz (2016) discuss in Chapter 2, “Wealth and Poverty,” the Millennium Development Goals were created to provide developing countries support through the partnership of developed countries. The first goal is to “eradicate extreme poverty and hunger” in the world.

According to the textbook, population is still increasing in the world’s poorest regions. Take a look at the The Millennium Development Goals Report [PDF]

  • The report notes that progress in reducing extreme hunger is uneven across regions of the world. Looking at the graph on page 21 of the report, which regions have the least reduction in extreme hunger? Which regions have the greatest reduction in extreme hunger? What factors contribute to this uneven progress? What are some possible strategies for creating more progress in these regions of the world?

COMPUTER SECURITY Week 11

create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Week 6

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?

Cloud Application Design (PPT 11 Slides)

 Competency

Contrast methodologies for the design and deployment of cloud applications.

Scenario

You are the cloud architect for an online furniture company. The entire business model of the company is online sales. The following are critical to the company:

  • The web application must run 24/7.
  • Proper disaster recovery must be in place so, if one site is down, traffic will automatically be diverted to another site.
  • The web application must have the proper load balancing so that customers will get quick responses.

In addition, the web application uses disk storage for the log files. This disk storage often gets full and causes downtime for the end customers.

Your manager has asked you to prepare a PowerPoint presentation for the leadership team to get the required funding for an improvement project. The project will help your company to convert the storage into the elastic storage.

Instructions

Create a PowerPoint with the following information:

Slide 1: Overview

Slide 2: Select a public cloud and identify elastic storage in which to store the log files.

Slide 3: List the benefits of using elastic storage.

Slide 4: Design architecture with built-in disaster recovery and fault tolerance.

Slides 5- 6: Describe the components that will be useful in completing the DR and fault tolerance approach on a public cloud.

Slide 7: Describe the importance of load balancing.

Slide 8: Describe different types of load balancing options.

Slide 9: Select the appropriate load balancing option and give the reasoning behind your selection.

Slide 10: Prepare a public cloud design/architecture diagram with Elastic Storage, Load Balancing, and DR solutions. You can use any tool to create the architecture diagram, then take a screenshot and insert it into the slide 10.

Slide 11: Include a minimum of 5 scholarly resources.

Resources

REQUIREMENT TO PASS (RUBRIC)

 The presentation contains 11 slides. 

 Full, robust, and detailed overview of the project. 

 Public cloud selected. A full, robust, and detailed description of elastic storage in which to store the log files. 

 A full, robust, and detailed explanation of the benefits of using elastic storage. 

 Full, robust, and detailed architecture design provided including disaster recovery and fault tolerance. 

 A full, robust, and detailed description of the components that will be useful in completing the DR and fault tolerance approach on a public cloud. 

 A full, robust, and detailed description of the importance of load balancing.

 A full, robust, and detailed description of different types of load balancing options. 

 Load balancing app selected; full, robust, and detailed reasons given for the selection. 

 A screenshot provided and all of the components (elastic storage, load balancing, or DR solution) are included. 

 5 scholarly references provided; documented correctly. 

2 discussions 1 weekly Summary

Discussion 1.2

Describe 3 targets of Cyberwar  

Discussion 2.1

Define and compare Kinetic and non-Kinetic war?  

Weekly Summary 2.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Writing Requirements

Practical Connection Paper

 

Assignment 2 – Practical Connection Paper

Develop a paper describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

Please refer to the attached text books for the 

Discussion 7

 

The rising importance of big-data computing stems from advances in many different technologies.  Some of these include:

  • Sensors
  • Computer networks
  • Data storage
  • Cluster computer systems
  • Cloud computing facilities
  • Data analysis algorithms

How does these technologies play a role in global computing and big data?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

The practice of BYOD by organizations creates many risks since users are accessing organizational networks with personal devices.

The practice of BYOD by organizations creates many risks since users are accessing organizational  networks with personal devices. Some of these risks are:  Jailbreaking or rooting that disables the built-in security of the device. Device sharing. Wide variety of devices, hardware, OSs, and security capabilities. Spreading infections from other networks, such as an employee’s home. Recovering hardware and data from a terminated employee. Using the Discussion Forum for this activity, discuss what organizations need to do, especially from an HR perspective, to limit the risk of BYOD.

300-350+ words with Citations. 

No-plag